Description
New City Regional Police system has 4 police office sites. They need your service to establish a new IT network. Police office sites must be connected to each other. The important files are going to be located in the main police HQ building (in the data center) and will be shared with all computers within a system by using the file transfer applications.
POLICE HQ MAIN BUILDING NEWYORK
Employing 100 people (full-time personnel).
5 story building
Each floor has LAN
POLICE OFFICE SITES has 4 off-site Offices in the city
There are 20 people (personnel) on each site
THERE IS A DATA CENTER WILL HAVE
Web Server, Email Server, and Print Server
Database for all Police officers
Database for all vehicles
Database for criminals
Make sure that organization’s data and applications will be protected and will continue to operate even in the face of intrusion, disruption, destruction, or disaster.
Make sure that organization’s data and applications will be protected and will continue to operate even in the face of intrusion, disruption, destruction, or disaster.
QUESTION 1: Present the location of the new data center on the given Intranet Diagram. Update the diagram and show how and where you place the new data center in the network diagram. Provide the new (updated) network diagram with the new data center on it. Your name must be on the diagram.
QUESTION 2: Police department managers are worrying about
a) Exposure of data in the data center to entities not authorized access to the information
b) Unauthorized Modification of data in the data center
c) Complete Destruction of the data kept in the databases
List the primary goals in providing security for all sections of the given Police IT system.
QUESTION 3: List the IT Assets of all Police departments. You should consider the INTRANET of the police IT system
QUESTION 4: Prepare the Control Spreadsheet (Table), which covers
Enter the IT assets in the intranet (that you prepared in question 3)
Cover Disruption, destruction, and disaster cases
Cover possible Intrusion (both external and inertial)
Use the given List of control measures to protect the IT system
Complete Control Spreadsheet
You should be using the following control measures while answering question 4
The disaster recovery plan and education/training
Halon-type fire system & sprinklers
Not on or below ground level
UPS (uninterruptible power source)
Virus-checking software present and updated
Strong password policy
Extensive user training about cybersecurity policy and practices
Firewalls for data
Develop a control table in an MS Word document. Here is an example
Your name must be on the table.